Get It Now

Share The Insights

Security that meets the demands of the world's toughest customer

Keep it safe. AT&T provides customers with a broad selection of mobile
devices and software, meeting the most exacting government standards for
security and information management. Agencies with security and mobile device
management requirements like FIPS 140-2, FISMA or DoD 8100.2
can count on AT&T for trustworthy mobile data and voice communications. We
offer:

A fortified network. Firewalls separate the AT&T
private network from the public Internet and protect against intrusions, from
spam to brute force attacks. Our digital network allows sophisticated
authentication and data encryption.

Secure communications devices for classified mobile
applications. For the most secure applications, AT&T has optimized
its network for the Secure Communications Interoperability Protocol (SCIP) and
HAIPE technologies, providing voice encryption as well as wireless access to
SIPRNET and other classified secure enclaves.

Productivity Tools. Full Personal Information Management
(PIM) functionality includes address book, calendar and meeting manager, as
well as push email with attachments.

Device security. AT&T partners with world-class device
manufacturers to offer secure hardware in addition to applications. For
example, Palm, Windows Mobile and BlackBerry smartphones can be equipped
with SmartCard Readers and S/MIME capabilities.

Many of our devices offer built-in security features, including restricted
access via password and the ability to remotely wipe data from a device or
disable it entirely. Some application vendors also provide remote security
console features, allowing an administrator to remotely kill or wipe data off a
device, or ensure that a user follows security policies.

Survivability and recoverability. With hundreds of recently
added cell sites, the AT&T network is designed to prevent outages and
recover quickly, if needed. Emergency equipment – COWs and COLTs (Cell on
Wheels and Cell on Light Truck) – is ready for immediate deployment. Agencies
also have 24-hour network surveillance and a dedicated help desk.